of 172 page(s)
Article Debunking PRO-GMO Hit Piece On Organic Foood Targeted By Massive Cyber Attack
by Anthony Gucciardi
September 5, 2012
Soon after a natural society article debunking a study demonizing organic food in favor of GMOs goes viral it is targeted in by a massive cyber attack.
On the night of September 2, after hearing about the ridiculous study that demonized organic food and claimed that it was virtually the same as GMO-laden conventional food, I decided to shoot a short 9 minute video within an accompanying article breaking down the study. As this was the night before the real news cycle began the following morning in the alternative media, this piece really blew up. It was graciously hosted on Alex Jones' Infowars as a featured news piece as well as featured in an article on the subject by NaturalNews' Mike Adams. Essentially, it was the first piece to really respond to the outlandish hit piece with a serious response. It may come as no surprise to many of you, then, to know that we were hit with a massive attack between the early morning hours of September 4th (as the piece really began to gain traction) and the night of the same day. Hit by a complicated series of denial of service attack (known as a DDoS attack) resulting in a complete server crash, we did our best to trace the location and halt the intrusion.
Urgent Security Update Regarding Your Bitly Account
May 8, 2014
We have reason to believe that Bitly account credentials have been compromised; specifically, users' email addresses, encrypted passwords, API keys and OAuth tokens.
We have no indication at this time that any accounts have been accessed without permission. We have taken steps to ensure the security of all accounts, including disconnecting all users' Facebook and Twitter accounts. All users can safely reconnect these accounts at their next login. We are recommending all Bitly users make these changes. Please take the following steps to secure your account: change your API key and OAuth token, reset your password, and reconnect your Facebook and Twitter accounts.
Saying Goodbye to Our Old Friend NPAPI
September 23, 2013
The Netscape Plug-in API (NPAPI) ushered in an early era of web innovation by offering the first standard mechanism to extend the browser.
In fact, many modern web platform features-including video and audio support-first saw mainstream deployment through NPAPI-based plug-ins. But the web has evolved. Today's browsers are speedier, safer, and more capable than their ancestors. Meanwhile, NPAPI's 90s-era architecture has become a leading cause of hangs, crashes, security incidents, and code complexity. Because of this, Chrome will be phasing out NPAPI support over the coming year.
5 things to do today to keep your data private
February 4, 2013
Today is Data Privacy Day, a global "holiday" aimed at raising awareness about online security and privacy.
However, it's hard not to be aware of the constant threats that hammer on our digital doors. The joy of the Internet is that we're all connected to each other, making it easy to share information and commerce. But there's also a dark side: Just as in the "real" world, the Net is full of evildoers who want to take advantage of the less-than-vigilant among us. Don't be one of them. On Data Privacy Day, take some time to secure your virtual borders. Here are five things you can do right now that will give you peace of mind and make it little harder for the jerks who want to steal your data, your identity and your cash.
ForEx Stat Arb Malware disguised as PDF steals user data
June 20, 2011
Statistical arbitrage (StatArb) as opposed to (deterministic) arbitrage, is associated with the statistical mispricing of one or more assets based on the expected value of these assets.
The attachment in the high-priority email below claims to be a plan for foreign exchange stat arb. Once extracted - the attachment file named "Plan-2011-July.zip" reveals an executable file which pretends to be a PDF file (since it presents a PDF icon). Disguising a file as a PDF is a common trick of malware nowadays - users should be wary and should look at the complete file extension.
Scam: Help! - I'm stuck in Valencia and need some money
June 6, 2011
This is not a new scam. But we wanted to add our recently received examples to the many already published all over the Internet simply to increase awareness.
These scams are clearly successful since a percentage of those approached are not aware of the scam and will actually send the money that has been requested. The scam works like this...
The iPhone 5 virus
by Avi Turiel
May 25, 2011
Most rumors have the iPhone 5 arriving sometime in September. Today we received a malicious email that exploits the hype surrounding the not-so-imminent release.
The email describes the "iPhone 5G S" (hope Apple is not taking notes). The text and forged images group together several of the rumors about the new device - slimmer, faster, bigger display, better cloud integration. And of course the big news - the "iPhone 5G S" is available in black!
Avoiding Facebook phishing
May 12, 2011
The page below was flagged by Commtouch's GlobalView URL Filtering as a phishing page yesterday. While we admire the authentic look of the page, there are several pointers that give this away as a phishing site...
Google's App Engine hosts HSBC phishing site
April 14, 2011
Heard of the Google App Engine? In their own words: "Google App Engine lets you run your web applications on Google's infrastructure.
But as they say "the road to phishing is paved with free services" So let's reword the above: "Google App Engine lets you run your phishing site on Google's infrastructure. Simply make a full copy of your favorite banking site (such as HSBC) and upload it as an app. Your fake HSBC site...
Abobe Flash vulnerability in Word document (Yes, Another One)
by Rebecca Herson
April 13, 2011
Malicious Adobe Flash files are making the rounds of some lucky individuals that have been targeted for spearphishing, according to news reports.
Adobe has confirmed that the vulnerability exists in its Flash program, and that the infected files have been distributed (so far) embedded in a Microsoft Word document sent as an email attachment. This is reminiscent of another weakness in Flash that was exploited back in March; however in that case malicious Flash files using a different vulnerability were distributed embedded in Excel files.
Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.